Re: NHRP question

Yakov Rekhter <yakov@cisco.com> Thu, 19 October 1995 12:35 UTC

Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa08015; 19 Oct 95 8:35 EDT
Received: from guelah.nexen.com by IETF.CNRI.Reston.VA.US id aa08011; 19 Oct 95 8:35 EDT
Received: from maelstrom.nexen.com ([204.249.99.5]) by guelah.nexen.com (8.6.12/8.6.12) with ESMTP id IAA13275; Thu, 19 Oct 1995 08:10:26 -0400
Received: (from root@localhost) by maelstrom.nexen.com (8.6.12/8.6.12) id IAA20487 for rolc-out; Thu, 19 Oct 1995 08:15:07 -0400
Received: from guelah.nexen.com (guelah.nexen.com [204.249.96.19]) by maelstrom.nexen.com (8.6.12/8.6.12) with ESMTP id IAA20478 for <rolc@nexen.com>; Thu, 19 Oct 1995 08:15:04 -0400
Received: from hubbub.cisco.com (hubbub.cisco.com [198.92.30.32]) by guelah.nexen.com (8.6.12/8.6.12) with ESMTP id IAA13251 for <rolc@nexen.com>; Thu, 19 Oct 1995 08:04:59 -0400
Received: from puli.cisco.com (puli.cisco.com [171.69.1.174]) by hubbub.cisco.com (8.6.12/CISCO.GATE.1.1) with SMTP id FAA25156; Thu, 19 Oct 1995 05:11:25 -0700
Message-Id: <199510191211.FAA25156@hubbub.cisco.com>
To: Joel Halpern <jhalpern@newbridge.com>
cc: rolc@nexen.com
Subject: Re: NHRP question
In-reply-to: Your message of "Wed, 18 Oct 95 17:23:15 +0400." <9510182123.AA10690@lobster.Newbridge.COM>
Date: Thu, 19 Oct 95 05:11:25 PDT
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: Yakov Rekhter <yakov@cisco.com>
X-Orig-Sender: owner-rolc@nexen.com
Precedence: bulk
X-Info: Submissions to rolc@nexen.com
X-Info: [Un]Subscribe requests to rolc-request@nexen.com
X-Info: Archives for rolc via ftp://ietf.cnri.reston.va.us/ietf-mail-archive/rolc/

Joel,

> Last time I spoke to Yakov about the router to router case, his goal was to
> eliminate all unsafe router-router cases.  There are safe cases.
> The intend of the combination of Q, S, and B bits was to identify the
> applicable cases.

As I mentioned in my other note, use of the current NHRP format (and
specifically its fixed header) may be a problem for the router-router
NHRP. So, I'd like to decouple the discussion on whether the
combination of Q, S, and B bits would be useful for the router-router
NHRP from the question I asked -- whether Q and S bits are useful for
the current (non router-router) NHRP. Let's focus (at least for now)
on the current NHRP.

> The general goal was to be able to tell if the requestor was a host
> or router, and whether the responder was someone it was safe for the
> requestor to talk to.  
> 
> 1) It seemed useful to distinguish between the "stable" case identified
> by the "B" bit, and the more specific case when the responder is a
> directly attached host.  Clearly it is not critical.

Do we have a practical example of when such distinction would be useful ?

> 
> 2) One could say that a source equivalent of the "B" bit would be better
> than the "Q" bit.  It would be more general.  However,
>     Most of us are probably assuming that information learned on behalf
>     of one source can be used for/with other sources.  
> If that is true, then the fact that a specific request is on behalf of
> an on-subnet host is not particularly important.  Therefore, what is
> needed to detect safety is the Q bit.

But the "B" bit (stable) carries sufficient semantics. So, why do
we need the "Q" bit ?
  
> In particular, an interdomain request is safe if the Q bit is on in the
> request, or the B bit is on in the response.  We could get rid of the S
> bit, although I think it is a useful subset of "B" to identify.

As you just indicated, there is redundancy among Q, B and S bits. I've
yet to see a practical example where this redundancy is needed.

I think that a single bit (indicating "stable" information) would be
sufficient. On the Request this bit would indicate that the information
provided by the originator of the Request is stable. On the Reply this
bit would indicate that the information provided by the originator of
the Reply is stable.

And if one bit is sufficient, then we should clean up the spec and
eliminate the other two.

Yakov.